Five Skillsets Needed for Securing IoT Today

Five Skillsets Needed for Securing IoT Today

On October 21, 2016 a sophisticated Distributed Denial-of-Service (DDoS) attack was launched that left customers of Amazon, Netflix, Twitter, and more without service, multiple times throughout the day.  TechTarget reported that the attack was leveled against Dyn, a Domain Name System (DNS) provider that services those brands, along with many others.  One of the contributing factors to the attack was that the hackers were able to infect Internet of Things (IoT) devices with the Mirai botnet. They were able to identify IoT devices that used default usernames and passwords (such as username: “admin,� password: “admin�), and turn them into drones in their DDoS cyberattack.

John Pironti, president of IP Architects, went on to explain to TechTarget, "The use of IoT devices for recent DDoS attacks has shown how fragile and insecure many of these devices currently are…. The first use was for DDoS, but these same devices are likely to be used as entry points to the internal networks they connect to as well as they become more pervasive."

Gartner projects that 20 billion IoT devices will be used by companies worldwide by 2020. This added mobility and productivity also brings the promise of multiplied threat vectors and vulnerabilities. If companies are ...


Read More on Datafloq
7 Proven Keys to Securing Your IoT Integrated Environment

7 Proven Keys to Securing Your IoT Integrated Environment

In a recent study in 2016, Gartner estimates that 6.4 billion connected devices will be used by companies worldwide. By 2020, it will top 20 billion. The increasing use of IoT devices in our corporate networks brings the promise of unparalleled coordination and productivity.  But it also brings the promise of multiplied threat vectors and vulnerabilities. 

Companies must react to this changing environment. The old methods of data protection relied on defensible perimeters around large, corporate data centers. More companies, however, are adopting mobile, IoT, and cloud technologies that live outside the data center.  The perimeter is now becoming a thing of the past.

Below are seven strategies to help equip the enterprise business meet the challenges of the current (and future) technology landscape. This, by no means, is exhaustive. Rather, they are stepping stones to create a defense-in-depth model as you secure your sensitive data.

The First Thing to Realize: There is No Perimeter

Back in 2014, Google laid the groundwork for looking at data protection in a whole new way with BeyondCorp, their internal data security initiative, co-authored by Rory Ward and Betsy Beyer. Here is part of their opening statement:

The perimeter security model works well enough when all employees work exclusively in buildings owned by an ...


Read More on Datafloq

Privacy Policy

Copyright © 2017 BBBT - All Rights Reserved
Powered by WordPress & Atahualpa
X